Home
Search results “Data mining and consumer privacy law”
Watchdog proposes a Texas Consumer Privacy Act
 
05:17
California is the first state in the nation to pass a strong Internet privacy law that protects its citizens from data mining. Texas should follow suit, says Watchdog Dave Lieber. Read more at: https://www.dallasnews.com/news/watchdog/2019/01/11/texas-copy-california-pass-new-internet-privacy-law-like-golden-states
Views: 50 Dave Lieber
Legal issues in big data
 
02:36
An explanatory brief video about the legal issues in Big Data What is big data? What kind of legal issues in big data? Consumer privacy Security of Personal Information Control over Data Intellectual Property Protection Terms of Service Agreement.
Social Media Data Privacy Awareness
 
02:11
Learn more about how social media platforms, businesses, and marketers, use your personal information and posts to social media to build profiles about you.
Data-mining: the new gold mine
 
02:35
Companies are getting more sophisticated on how they monitor customer movements and buying habits. Is it possible to maintain privacy in an increasingly public world?
Views: 1021 CGTN Global Business
Applications of Predictive Analytics in Legal | Litigation Analytics, Data Mining & AI | Great Lakes
 
30:12
#PredictiveAnalytics | Learn the prediction of outcome or treatment of a case by legal courts of Appeals based on historical data using predictive analytics. Watch the video to understand analytics in legal using case study on real-life data set. How litigation analytics can flourish with the use of data mining and AI. Know more about our analytics Program: PGP- Business Analytics: https://goo.gl/V9RzVD PGP- Big Data Analytics: https://goo.gl/rRyjj4 Business Analytics Certification Program: https://goo.gl/7HPoUY #LegalTech #LegalAnalytics #GreatLearning #GreatLakes About Great Learning: - Great Learning is an online and hybrid learning company that offers high-quality, impactful, and industry-relevant programs to working professionals like you. These programs help you master data-driven decision-making regardless of the sector or function you work in and accelerate your career in high growth areas like Data Science, Big Data Analytics, Machine Learning, Artificial Intelligence & more. - Watch the video to know ''Why is there so much hype around 'Artificial Intelligence'?'' https://www.youtube.com/watch?v=VcxpBYAAnGM - What is Machine Learning & its Applications? https://www.youtube.com/watch?v=NsoHx0AJs-U - Do you know what the three pillars of Data Science? Here explaining all about the pillars of Data Science: https://www.youtube.com/watch?v=xtI2Qa4v670 - Want to know more about the careers in Data Science & Engineering? Watch this video: https://www.youtube.com/watch?v=0Ue_plL55jU - For more interesting tutorials, don't forget to Subscribe our channel: https://www.youtube.com/user/beaconelearning?sub_confirmation=1 - Learn More at: https://www.greatlearning.in/ For more updates on courses and tips follow us on: - Google Plus: https://plus.google.com/u/0/108438615307549697541 - Facebook: https://www.facebook.com/GreatLearningOfficial/ - LinkedIn: https://www.linkedin.com/company/great-learning/ - Follow our Blog: https://www.greatlearning.in/blog/?utm_source=Youtube
Views: 839 Great Learning
Data Protection and Privacy
 
02:51
Increasingly, an ever-wider range of economic, political and social activities are moving online, encompassing various kinds of information and communications technologies (ICTs). The evolving ICT use is having a transformational impact on the way business is done, and the way people interact among themselves, as well as with government, enterprises and other stakeholders. This new landscape gives rise to new business models and a wider scope for innovation. At the same time, it facilitates undesirable activities online, including cybercrime. Against this background, world leaders in 2015 underscored the importance of adopting relevant policy responses to harness the potential of ICTs for all seventeen Sustainable Development Goals (SDGs). Creating trust online is a fundamental challenge to ensuring that the opportunities emerging in the information economy can be fully leveraged. The handling of data is a central component in this context. In today's digital world, personal data are the fuel that drives much commercial activity online, raising concerns of privacy and security of information. The present regulatory situation is far from ideal. Some countries lack rules altogether. Some national pieces of legislation are incompatible with each other. UNCTAD provides legal advise and build capacity of policy and law makers. It also serves as a valuable forum for a much-needed global dialogue geared to building consensus in a very important policy field such as data protection. UNCTAD's work on Developing electronic commerce legislation: http://unctad.org/en/Pages/DTL/STI_and_ICTs/ICT4D-Legislation.aspx
Views: 28326 UNCTADOnline
Obama Seeks Data Hacking, Student Privacy Laws
 
01:38
President Barack Obama wants Congress to pass legislation requiring companies to inform customers within 30 days if their data has been hacked, a move that follows breaches at retailers including Target, Home Depot and Neiman Marcus. (Jan. 12) Subscribe for more Breaking News: http://smarturl.it/AssociatedPress Get updates and more Breaking News here: http://smarturl.it/APBreakingNews The Associated Press is the essential global news network, delivering fast, unbiased news from every corner of the world to all media platforms and formats. AP’s commitment to independent, comprehensive journalism has deep roots. Founded in 1846, AP has covered all the major news events of the past 165 years, providing high-quality, informed reporting of everything from wars and elections to championship games and royal weddings. AP is the largest and most trusted source of independent news and information. Today, AP employs the latest technology to collect and distribute content - we have daily uploads covering the latest and breaking news in the world of politics, sport and entertainment. Join us in a conversation about world events, the newsgathering process or whatever aspect of the news universe you find interesting or important. Subscribe: http://smarturl.it/AssociatedPress http://www.ap.org/ https://plus.google.com/+AP/ https://www.facebook.com/APNews https://twitter.com/AP
Views: 2180 Associated Press
What is Big Data and Information Privacy
 
08:22
What is Big Data and what does it have to do with how your information is shared?
Views: 62 Raqib Hussain
Information Privacy Law 6 - John Doe
 
06:22
Script by Professor Randy Dryer, design by Aaron Dewald, University of Utah S.J. Quinney College (c) 2013
Disciplinary consequences for a privacy breach
 
09:51
In this excerpt from her October 2017 Privacy Officer training Kate discusses the elements of a privacy breach that should be considered when thinking about what disciplinary action to take against a member of staff.
The data cycle - for consumers
 
02:47
The data cycle -- showing how one person's personal data can be used, passed on and re-used in ways that people may not expect. Gives advice about what to do to reduce nuisance calls.
Framing Big Data and Privacy
 
01:16:56
The first session from the Big Data & Privacy: Making Ends Meet conference held on September 10, 2013. Event was co-hosted by the Future of Privacy Forum and Stanford Law School's The Center for Internet and Society. Panelists are Martin Abrams, Deirdre Mulligan, Neil Richards, Omer Tene, Erik Jones, and Jules Polonetsky moderated.
Views: 801 TAPolicy
The EU data protection reform. Privacy & consumer protection - Forum keynote speech (Lee A. Bygrave)
 
54:55
Il simposio si è posto quale occasione di confronto e riflessione sulla riforma della normativa in materia di protezione dei dati personali, attualmente in discussione a livello comunitario. Lee A. Bygrave (Università di Oslo | Direttore, Norwegian Research Center for Computers and Law). Maggiori informazioni sono disponibili all'indirizzo: http://nexa.polito.it/2014/10/eu-data-protection-reform.
Data Privacy Under Certain Illinois Statutes: What is Required? (E5)
 
05:04
In this episode I discuss some of the Illinois Statutes that govern the handling of personal information: 1) Personal Information Protection Act, 2) Consumer Fraud and Deceptive Practices Act, 3) Right to Privacy in the Workplace Act, and the 4) Biometric Information Privacy Act.
Views: 96 Streur Law
All Consuming Legal Insights - Data Protection
 
06:13
This week's instalment of 'All Consuming Legal Insights', focuses on Data Protection. Our final video to follow next week will cover advertising. If you would like to discuss any of the points raised in this video in more detail, we would be delighted to speak with you. http://www.taylorwessing.com/services/our-industries/consumer-brands/all-consuming.html
Views: 149 Taylor Wessing LLP
Algorithmic Consumers
 
01:06:36
Hate shopping? The next generation of e-commerce will be conducted by digital agents, based on algorithms that will not only make purchase recommendations, but will also predict what we want, make purchase decisions, negotiate and execute the transaction for the consumers, and even automatically form coalitions of buyers to enjoy better terms, thereby replacing human decision-making. Algorithmic consumers have the potential to change dramatically the way we conduct business, raising new conceptual and regulatory challenges. This game-changing technological development has significant implications for regulation, which should be adjusted to a reality of consumers making their purchase decisions via algorithms. Despite this challenge, scholarship addressing commercial algorithms focused primarily on the use of algorithms by suppliers. In this presentation we explore the technological advances which are shaping algorithmic consumers, and analyze how these advances affect the competitive dynamic in the market. We analyze the implications of such technological advances on regulation, identifying three main challenges. We further discuss some of the challenges to human autonomous choice that arise from these developments, and examine whether the existing legal framework is adequate to address them. About Michal Michal Gal (LL.B., LL.M., S.J.D.) is Professor and Director of the Forum on Law and Markets at the Faculty of Law, University of Haifa, Israel. She was a Visiting Professor at NYU, Columbia, Georgetown, Melbourne and Lisbon. Prof. Gal is the author of several books, including Competition Policy for Small Market Economies (Harvard University Press, 2003). She also published scholarly articles on competition law issues and has won prizes for her research and for her teaching. Inter alia, she was chosen as one of the ten most promising young legal scholars in Israel (Globes, 2007) and as one of the leading women in competition law around the world (Global Competition Review). Her paper, "Merger Policy for Small and Micro Economies", won the Antitrust Writings Award for best paper on merger policy in 2013, and her paper on "Access to Big Data" (with Daniel Rubinfeld) is short-listed for this year's prize. Prof. Gal is the President of the International Academic Society for Competition Law Scholars (ASCOLA). She served as a consultant to several international organizations (including OECD, UNCTAD) on issues of competition law and was a non-governmental advisor of the International Competition Network (ICN). She also advised several small economies and regiional organizations on the framing of their competition laws. She is a board member of several international antitrust organizations, including the American Antitrust Institute (AAI), The Antitrust Consumer Institute, the Asian Competition Law and Economics Center (ACLEC). She clerked at the Israeli Supreme Court, and her work is often cited in the decisions of the Court on competition matters. About Niva Niva Elkin-Koren is a Visiting Professor of Law at HLS, where she teaches Digital Copyright, and a Faculty Associate at the Berkman Klein Center . She is the founding director of the Haifa Center for Law & Technology (HCLT) and the former dean of the University of Haifa, Faculty of Law. Her research focuses on the legal institutions that facilitate private and public control over the production and dissemination of knowledge. She has written and spoken extensively about digital governance, legal oversight of algorithmic decision-making, liability of online intermediaries, the privatization of information policy, private ordering, the economic analysis of intellectual property, and legal strategies for enhancing the public domain. She is the Chair of the Scientific Advisory Council, of the Alexander von Humboldt Institute for Internet and Society in Berlin, a member of the Executive Committee of Association for the Advancement of Teaching and Research in Intellectual Property (ATRIP), and an Advisory Board Member in the Information Program of the Open Society Foundation. She is also a member of the editorial boards of the Journal of the Copyright Society (since 2009) the Journal of Information Policy (since 2010) and the Internet Policy Review (since 2016). Prof. Elkin-Koren received her LL.B from Tel-Aviv University Faculty of Law in 1989, her LL.M from Harvard Law School in 1991, and her S.J.D from Stanford Law School in 1995. For more on this event visit: https://cyber.harvard.edu/events/luncheons/2017/04/AlgorithmicConsumers
Avoiding legal privacy and security snafus with big data and the IoT - Strata + Hadoop
 
33:30
As the number of smart devices and types of big data services grow, the relevant legal risk and compliance questions continue to increase and evolve as well. Alysa Hutnik and Kristi Wolff provide practical privacy, data security, and consumer protection dos and don’ts to help avoid becoming a legal target. Subscribe to O'Reilly on YouTube: http://goo.gl/n3QSYi Follow O'Reilly on Twitter: http://twitter.com/oreillymedia Facebook: http://facebook.com/OReilly Google: http://plus.google.com/+oreillymedia
Views: 896 O'Reilly
28c3: Smart Hacking for Privacy
 
01:00:17
Download high quality version: http://bit.ly/sexyIG Description: http://events.ccc.de/congress/2011/Fahrplan/events/4754.en.html Dario Carluccio, Stephan Brinkhaus: Smart Hacking For Privacy Advanced metering devices (aka smart meters) are nowadays being installed throughout electric networks in Germany, in other parts of Europe and in the United States. Due to a recent amendment especially in Germany they become more and more popular and are obligatory for new and refurbished buildings. Unfortunately, smart meters are able to become surveillance devices that monitor the behavior of the customers leading to unprecedented invasions of consumer privacy. High-resolution energy consumption data is transmitted to the utility company in principle allowing intrusive identification and monitoring of equipment within consumers' homes (e. g., TV set, refrigerator, toaster, and oven) as was already shown in different reports. This talk is about the Discovergy / EasyMeter smart meter used for electricity metering in private homes in Germany. During our analysis we found several security bugs that range from problems with the certificate management of the website to missing security features for the metering data in transit. For example (un)fortunately the metering data is unsigned and unencrypted, although otherwise stated explicitly on the manufacturer's homepage. It has to be pointed out that all tests were performed on a sealed, fully functionally device. In our presentation we will mainly focus on two aspects which we revealed during our analysis: first the privacy issues resulting in even allowing to identify the TV program out of the metering data and second the "problem" that one can easily alter data transmitted even for a third party and thereby potentially fake the amount of consumed power being billed. In the first part of the talk we show that the analysis of the household's electricity usage profile can reveal what channel the TV set in the household is displaying. We will also give some test-based assessments whether it is possible to scan for copyright-protected material in the data collected by the smart meter. In the second part we focus on the data being transmitted by the smart meter via the Internet. We show to what extent the consumption data can be altered and transmitted to the server and visualize this by transmitting some kind of picture data to Discovergy's consumption data server in a way that the picture content will become visible in the electricity profile. Moreover, we show what happens if the faked power consumption data reflects unrealistic extreme high or negative power consumptions and how that might influence the database and service robustness.
Views: 49026 28c3
DMA data protection series - Alex Hazell
 
09:54
Alex Hazell, head of UK legal, Acxiom Alex Hazell, came to DMA House to give his views on data protection regulation. Alex has over 15 years’ experience as a commercial technology and privacy lawyer and advises on all aspects technology contract law, data protection law, intellectual property law, employment law, corporate law and commercial litigation. Find out what Acxiom are doing to prepare for upcoming change in the EU's data landscape.
Views: 404 DMA UK
OBAMA-CONSUMER PRIVACY BILL OF RIGHTS
 
00:53
Obama:I hope Congress joins us to make the consumer privacy bill of rights the law of the land. To License This Clip, Click Here: http://collection.cnn.com/content/clip/37076812_001.do
Views: 89 CNN
Who Owns Our Data?
 
23:01
This section of the news covers privacy and data collection. Privacy https://apnews.com/96928216bdc341ada659447973a688e4 https://krebsonsecurity.com/2018/06/google-to-fix-location-data-leak-in-google-home-chromecast/ https://arstechnica.com/tech-policy/2018/06/verizon-and-att-will-stop-selling-your-phones-location-to-data-brokers/ https://www.businesswire.com/news/home/20180619005602/en/Amazon-Helps-Hotels-Offer-New-Engaging-Guest http://thehill.com/business-a-lobbying/393583-amazon-employees-protest-sale-of-facial-recognition-tech-to-law https://www.scribd.com/document/382334740/Dear-Jeff https://www.theverge.com/2018/6/22/17424740/supreme-court-carpenter-decision-privacy
Views: 452 Switched to Linux
The CR Privacy Hour: LIVE from Consumer Reports Labs
 
01:01:30
Is your TV sharing your personal data? What about your child's connected toy? As consumers, we're more vulnerable to digital security breaches than ever before. Here at CR, consumer privacy is important to us. Join us for a live conversation on Digital Privacy with CR resident experts and CR journalists. We'll cover: - Smart TV's and connected toys - should you be worried? - Digital privacy best practices - Easy ways to protect yourself now Share your questions and comments with CR experts in real time via Consumer Reports Facebook, YouTube and Twitter Learn how to protect your privacy and shrink your exposure to telemarketers, bulky catalogs, and online data mining. Sign up to watch and receive the latest updates for this event—and follow the hashtag #CRPrivacyHour Check out http://www.ConsumerReports.org for the latest reviews, tips, and recommendations and subscribe to our YouTube Channel: http://bit.ly/1Nlb1Ez Follow Us on Social: Facebook: http://on.fb.me/1IQ2w5q Twitter: http://bit.ly/1Yf5Fh2 Pinterest: http://bit.ly/1P37mM9 Instagram: http://bit.ly/1I49Bzo Google+: http://bit.ly/1Md3gfQ
Views: 2950 Consumer Reports
GDPR EXPLAINED - EU/GB DATA PROTECTION
 
03:03
Become GDPR Compliant, contact [email protected] The new General Data Protection Legislation comes into effect the 25th of May 2018. Are you ready? OSP Cyber Academy provide GCHQ Certified Awareness Courses and Practitioner Training to help you prepare and understand the new GDPR Laws.
Data & Analytics in the Law - NYC - Sep 27 2017
 
01:08:17
Today Artificial Intelligence (AI), Blockchain, smart contracts, machine learning are top of mind and the legal profession is no exception. Law firms are hiring Chief Data Scientists; in-house departments are pressured to do more with less; and there have been two legal blockchain projects recently announced. By crunching data and using automation, lawyers can improving efficiency and accuracy and delivering better services to clients. Hear from experts on how your organization can harness information; produce analytics; and benefit from innovation in the law. 00:27 Welcome – Mary Juetten, Evolve Law 03:27 Darwin Talk – AI: An Historical Perspective – Dean Sonderegger, Wolters Kluwer 13:05 Expert Panel: Data & Analytics in the Law Moderator – Mary Juetten, Evolve Law Bennett Collen, Cognate Houman Shadab – New York Law School, Clause.io Susan Chazin, Wolters Kluwer Aaron Wright, Cardozo Law VENUE SPONSOR Cardozo Law - https://www.cardozo.yu.edu/ SPONSOR Wolters Kluwer - http://wolterskluwer.com/ ABOUT EVOLVE LAW Evolve Law brings together legal tech companies, attorneys, in-house counsel, entrepreneurs, and law schools for events centered around product demos, education, and discussion around the future of law. http://evolvelawnow.com #evolvelawlive #3539
Views: 469 Evolve the Law
Data Protection At Work: Introduction & Case Study
 
02:02
http://www.tvchoice.uk.com - 23 mins, 2012 Key Topics Data Protection Act Privacy Information Commissioner Personnel Records What is meant by data protection? Why is it important? What does it mean to an employee? INTRODUCTION 5 mins The data protection act was passed to protect individuals from their personal information being used for purposes other than for which it was intended -- and possibly misused. But how does data protection affect people at work? And what problems does it pose for employers? CASE STUDY: THE WORRIED EMPLOYEE 6 mins Rosie is worried she may lose her job because of mistakes in her company's personnel records. She wants to check the information her employer holds on her. But what information does her company have? Has she got a right to see it? INFORMATION COMMISSIONER 12 mins David Smith explains his role as information commissioner and how he and his colleagues try to enforce the data protection law. He can fine companies for breaking the law -- but why does he believe data protection so important? What extra powers does he wish he had? TV CHOICE has a range of over 200 educational films and film clips for Business Studies, Geography, History, Leisure and Tourism and many other subjects. USA FORMATS AVAILABLE. http://www.tvchoice.uk.com
Views: 172 TVChoiceFilms
Andreas Weigend: "Data for the People" | Talks at Google
 
48:56
DATA FOR THE PEOPLE: How to Make Our Post-Privacy Economy Work for You Andreas Weigend is one of the world's foremost experts on the future of big data, social-mobile technologies, and consumer behavior. Previously the chief scientist at Amazon, he is now the founding director of the Social Data Lab at Stanford. Weigend considers questions such as: How might people gain control of how their data is used to actually make it work for and not against them? Is it possible for individuals to get more from big data than they contribute to it? What would it take and how feasible is it? How can companies and individuals become equal partners? Big data is here to stay, but the fact is, individuals are still subject to risks and generally do not benefit from the wealth of our own data that others are collecting. For data refiners and individuals alike, this is a chance to explore these questions and more with an experienced guide. Get the book here: https://goo.gl/NKW2ra
Views: 4220 Talks at Google
Tech World: Facebook, Cambridge Analytica and Google's Project Maven
 
06:34
Welcome to Tech World, your quick roundup of some of the top technology news stories from across the globe. This month, we bring you the latest on the Facebook and Cambridge Analytica fiasco, YouTube’s alleged breach of child protection laws and more. For this episode’s Hot Topic interview, we spoke to EY's Praveen Shankar about the firm’s smart home survey results. First though, here are your top international stories. FACEBOOK AND CAMBRIDGE ANALYTICA Facebook has told members if they were among the 87 million potential customers whose data was shared with Cambridge Analytica, the data mining firm accused of using users’ personal details for political purposes. Every Facebook account holder received one of two notifications, informing them whether their data had been compromised or not. Users were also shown what apps they use and what data those apps may have obtained. Aside from the Cambridge Analytica fiasco, Facebook has also suspended Cubeyou, another data analytics firm, ahead of an investigation to ascertain whether the company collected data for academic purposes and then used it for commercial gains after partnering with Cambridge University. Cubeyou, however, denies the allegations. Cambridge University state that the app say they made it clear that data was academic and business purposes. 2. YOUTUBE CHILD PROTECTION LAWS In other news, video sharing giant YouTube, which tragically bore witness to a shooting at its San Bruno HQ in California earlier this month, has been accused of violating child protection laws in the US. A coalition of 23 consumer, child safety and privacy advocacy groups filed a complaint with the Federal Trade Commission alleging that YouTube was collecting data from children younger than 13. The complaint said YouTube was "skirting the law and profiting off of children without parents' knowledge or consent". In turn, Google said in a statement that YouTube was not for children. 3. GOOGLE PENTAGON PROJECT Thousands of Google workers have signed an open letter requesting that the internet company cease working on a project for the US military. Project Maven leverages AI to improve the precision of military drone strikes and employees think Google’s involvement will result in irreparable damage for the brand. The open letter, addressed to Google chief exec Sundar Pichai, said the employees believed the company should not be in the business of war, and therefore requested that Project Maven be cancelled. Additionally, employees asked that Google draft, publicise and enforce a clear policy stating that neither Google nor its contractors would ever build warfare technology.
Views: 100 UKTN
1.3.4 Lauren Solberg - Regulating Human Subjects.mov
 
10:29
This video series is made available from the Northern Kentucky University Law Review Symposium in conjunction with the NKU Chase Law + Informatics Institute. This collection of materials from the March1-2, 2012 provides a permanent collection of the exceptional presentations provided by the participants. This video features Lauren Solberg on the topic of Regulating Human Subjects. From the program abstract: "Regulating Human Subjects Research in the Information Age: Data Mining on Social Networking Sites " Presented by Lauren Solberg In the 1970s, the Department of Health, Education & Welfare promulgated the first regulations governing research with human subjects. Currently, the Department of Health and Human Services regulates both biomedical and behavioral research with human subjects through 45 C.F.R. § 46, but these regulations have not been revised to address the advances in technology that have changed the ways in which human subjects research is conducted in the 21st century. One of these advances includes researchers' use of the Internet for various research purposes, including recruiting subjects for their studies, as well as mining data on social networking sites. The issue of data mining on social networking sites for research purposes is becoming more important as researchers in a number of academic fields are collecting research data in this manner. The question of whether such research involves "human subjects" as the term is defined in 45 C.F.R. § 46 is important because the answer dictates whether or not such research is subject to federal regulation and oversight. The U.S. Department of Health and Human Services' Office for Human Research Protections (OHRP) has previously acknowledged an increased use of the Internet for research purposes, but it has not published any guidance about how the Office understands the issue (nor have any applicable specific regulations been promulgated). Such guidance, and particularly guidance that addresses the use of social networking sites for research purposes, is becoming increasingly more important as researchers are expanding beyond just Facebook and MySpace to recruit research participants and collect data. Furthermore, new social networking sites such as PatientsLikeMe.com are changing the ways in which both behavioral and biomedical researchers recruit and interact with study participants. This presentation identifies three key research activities that any new guidance that the OHRP publishes about Internet research should address: (1) the use of the Internet (including social networking sites) to recruit subjects; (2) the use of the Internet to collect personal information via direct interaction with site users; and (3) the collection of personal information from the Internet for research purposes without direct interaction with the owner of the information, i.e. data mining. It further explores recent case law that says that there is no reasonable expectation of privacy with respect to information posted on social networking sites, and discusses the history of privacy in the federal regulations governing research with human subjects. This Article concludes that in light of the changes in online social networking, as well as the consideration that the Department of Health and Human Services is giving to revising 45 C.F.R. §46, guidance -- or even new regulations -- should be drafted that address these key research activities. It furthermore suggests language that would inform researchers and research institutions whether each of these key research activities are subject to the regulations governing research with human subjects. This video is provided under license: http://creativecommons.org/licenses/by-nc-nd/3.0/. About the NKU Chase law + Informatics Institute: The NKU Chase Law + Informatics Institute provides critical interdisciplinary research regarding law, regulation, and industry practice as it is applied across complex information systems, emerging technology, and all areas of law. While not limited to any particular legal field, the Institute emphasizes intellectual property law, privacy, business and securities law, international law, and evidentiary rules because the creation, acquisition, aggregation, security, manipulation, and exploitation of data have extensive legal and societal consequences in these fields.
Views: 236 lawandinformatics
Tim Cook Tears Into Personal Data-Based Advertising
 
01:41
Tim Cook sought to distance Apple from the data-mining and advertising practices of other Silicon Valley companies. Follow : http://www.twitter.com/ See more at http://www.newsy.com Transcript: Tim Cook delivered a scathing speech at the Electronic Privacy Information Center. Some of his remarks were apparent attempts to set Apple apart from other industry heavyweights, which he never named outright but are believed to be the Facebooks and Googles of Silicon Valley. (Video via Google) He said these companies grow "by lulling their customers into complacency about their personal information" and then monetizing it. "We think that's wrong. And it's not the kind of company that Apple wants to be." Cook cautioned against free online services, saying, "We don't think they're worth having your email, your search history and now even your family photos data mined and sold off for god-knows-what advertising purpose." And he directed some of his comments toward government stances on information security and the chilling effect it could have on constitutional protections. He pointed out even if the U.S. government gets around encryption, criminals will still use it. (Video via the Electronic Frontier Foundation) "Weakening encryption, or taking it away, harms good people that are using it for the right reasons," he said. It was one of Cook's more focused criticisms of today's privacy environment, but it wasn't his first. He spoke on user trust, encryption and security at the White House Summit on Cybersecurity and Consumer Protection earlier this year. (Video via The White House) And to PBS' Charlie Rose on the same issues in 2014. "Our business, Charlie, is based on selling these [iPhones]. Our business is not based on having information about you. You're not our product," Cook said. Now, there is a degree of hypocrisy to Cook's speech, considering Apple enables these companies it's indirectly tearing down through its own app store. But as TechCrunch notes, Apple does at least appear to be coming from more justifiable ground. Unlike Google and Facebook, Apple doesn't make the bulk of its money from advertising. Sources: Electronic Privacy Information Center https://epic.org/2015/06/tim-cook-backs-privacy-crypto-.html Google https://www.youtube.com/watch?v=ydBjsZnHrwM Getty Images http://www.gettyimages.com/detail/news-photo/apple-ceo-tim-cook-speaks-on-stage-during-an-apple-special-news-photo/465687158 Fortune http://fortune.com/2015/06/03/tim-cook-attacks-facebook-google-government-privacy-speech/ Getty Images http://www.gettyimages.com/detail/news-photo/apple-ceo-tim-cook-speaks-during-the-white-house-summit-on-news-photo/463364528 Electronic Frontier Foundation https://www.youtube.com/watch?v=5UsoZmMD5_A The White House https://www.youtube.com/watch?v=KlTo9hFAFXs PBS https://www.youtube.com/watch?v=Bmm5faI_mLo Apple https://itunes.apple.com/us/artist/google-inc./id281956209 TechCrunch http://techcrunch.com/2015/06/02/apples-tim-cook-delivers-blistering-speech-on-encryption-privacy/#.f84ghg:6p7v Image via: Getty Images / Justin Sullivan http://www.gettyimages.com
Views: 1569 Newsy Tech
The Health Data Revolution: Improving Outcomes, Protecting Privacy
 
57:03
Will the next great medical insight come from a clinical trial, a laboratory study — or a database search? Today, health systems and insurers have access to a mountain of data about millions of Americans: what medications they take, their health history, even, in some cases, their genetics—plus an emerging body of mobile health data. Using “big data” techniques, doctors and researchers are already mining this data to deliver better care and to gain insights into the kind of hyper-specific questions that clinical trials and observational studies struggle to answer. The approach promises major, rapid-fire, highly-personalized discoveries. At the same time, with the specter of cyberattacks and hacks looming, the need for rugged privacy protection has never been greater. In this Forum, experts in healthcare data and privacy will discuss the potential for future discovery, practical steps to enable progress, and how information can be kept secure. Part of the The Dr. Lawrence H. and Roberta Cohn Forums, this event was presented jointly with HuffPost on Tuesday, December 5, 2017. Watch the entire series at ForumHSPH.org.
Acxiom CEO: "GDPR is Just the First Step in the Journey"
 
04:54
Its share price is still rebuilding after being battered by Facebook's decision to cut ties in March, but Acxiom is trying to see profound ad industry challenges as opportunities. Acxiom is a data warehouse firm that sells consumer profiles to the world's largest companies, available to advertisers and ad-tech platforms for advanced customer targeting. In one big challenge, Facebook said it would shut Partner Categories, through which it allowed advertisers to target ads using customer profiles bought from data brokers like Acxiom. In another, Europe's GDPR on May 25 introduces more stringent controls on the levels of consent required to process consumer data in this way. But Acxiom CEO Scott Howe says he sees the silver lining. "Consumer privacy is an important issue, for the entire industry," Howe says in this video interview with Beet.TV. "But, it's also an incredible opportunity. "When we ask consumers their opinion, it's amazing. Far more of them want to offer up their favorite brands, information about themselves, in an effort to have better experiences, and cultivate better relationships with the companies that they love, than want to opt out. "What they don't have, and what the industry needs to provide them, is increased visibility, and increased choice about how that information is used." Howe says he hopes to see methods that make consumers' data-for-services trade-off an automatic expectation. He says that would lead to better-quality information about customers and better consumer experiences in return. So what about GDPR? The new European legislation introduces a host of new rights for consumers over the way their personal data is harvested, stored and processed, including a strict requirement that they must explicitly opt in for such things. The new limits threaten to curtail some of the advanced ad targeting practices that have grown up around programmatic in the last five years. But Howe is trying to see the positives. "GDPR is the first step in a journey," he says. "And ultimately, what GDPR really accomplishes is, it gives consumers more visibility, and more choice." More than that, Howe expects similar policy to come ashore in the US - and he is actually advocating it applies in all states. "We're going to start to see GDPR type regulation occur here in the United States," Howe continues. "We're seeing that with the California ballot initiative. There are a variety of other initiatives contemplated at the state level. "The intent behind each one of those legislations is good, it's about visibility, choice, control. What I'd like to see is, rather than deal with a patchwork of individual state legislation, that we elevate the discussion to the federal level, and really try to land on a one-size-fits-all framework, such that we don't have to deal with the tax created from 50 different states but, instead, deal with a uniform law, that spans all states." This video was recorded at the annual DMS conference presented by LUMA Partners. This video is part of a series titled The Consumer First, a New Era in Digital Media presented by MediaMath.  For more from the series, please visit this page.
Views: 94 BeetTV
Alessandro Mantelero: Personal data for decisional purposes in the age of analytics
 
01:15:22
New technologies and powerful analytics make it possible to collect and analyse large amounts of data in order to identify patterns in the behaviour of groups, communities and even entire countries. Nevertheless, existing case law and regulations are inadequate to address the potential risks and issues related to this change of paradigm in social investigation. Both the right to privacy and the right to data protection are protected as individual rights. Although the social dimension of these rights has been taken into account by courts and policymakers in various countries, the right holder has always been the data subject and the rights related to informational privacy have mainly been exercised by individuals. This atomistic approach shows its limits in the existing context of mass predictive analysis, where the larger scale of data processing and the deeper analysis of information make it necessary to consider another layer, which is different from individual rights. This new layer is represented by the collective dimension of data protection, which protects groups of persons from the potential harms of discriminatory and invasive forms of data processing. On the basis of the distinction between individual, group and collective dimensions of privacy and data protection, the seminar outlines the main elements that characterise the collective dimension of these rights and the representation of the underlying interests. Web: http://in3.uoc.edu/opencms_portalin3/opencms/en/activitats/seminaris/agenda/2015/agenda_034
NSA Data Mining: Should U.S. Expect More Leaks?
 
04:34
June 10 (Bloomberg) -- Bloomberg's Hans Nichols and Contributing Editor Richard Falkenrath examine the former CIA employee who claims to have leaked information on the government's gathering of big data and whether we can expect to see further details from other people. They speak on Bloomberg Television's "Bloomberg Surveillance." -- Related story: http://www.bloomberg.com/news/2013-06-09/nsa-whistleblower-is-29-year-old-american-guardian-reports.html -- Subscribe to Bloomberg on YouTube: http://www.youtube.com/Bloomberg "Bloomberg's Surveillance" is a radio and TV business news show, featuring in-depth interviews with well-known business leaders, market analysts and leading economists. The show is hosted by Tom Keene, Sara Eisen and Scarlet Fu and includes frequent insight and analysis from economics editor Mike McKee. "Bloomberg Surveillance" covers market news, breaking news, finance, investment, global economics, business leaders and influencers, as well as the headlines and companies impacting the day ahead on Wall Street. In addition to covering Wall Street, the show includes global economics, currency market moves, earnings news, mergers & acquisitions, and insights on the world leaders and influencers shaping these events, including: Federal Reserve chairman Ben Bernanke, JPMorgan CEO and chairman Jamie Dimon, Apple CEO Tim Cook, Yahoo! CEO Marissa Mayer, Goldman Sachs CEO Lloyd Blankfein, Goldman COO Gary Cohn, economist Nouriel Roubini, investor Marc Faber, IMF chief Christine Lagarde, world bank president Jim Yong Kim, Meredith Whitney, former Wall Street executive Sallie Krawcheck and more. "Surveillance" broadcasts from Bloomberg TV's New York headquarters. The show airs on TV at 6-8amET/3-5am PT and on radio 6-10amET/3-7am PT. For a complete compilation of Surveillance videos, visit: http://www.bloomberg.com/video/bloomberg-surveillance/ Watch "Surveillance" on TV, on the Bloomberg smartphone app, on the Bloomberg TV + iPad app or on the web: http://bloomberg.com/tv Bloomberg Television offers extensive coverage and analysis of international business news and stories of global importance. It is available in more than 310 million households worldwide and reaches the most affluent and influential viewers in terms of household income, asset value and education levels. With production hubs in London, New York and Hong Kong, the network provides 24-hour continuous coverage of the people, companies and ideas that move the markets.
Views: 412 Bloomberg
1.24.12 Collection of Online Consumer Data
 
01:29:37
Speakers: Jim Adler, Chief Privacy Officer & General Manager, Data Systems, Intelius Nick Bicanic, CEO and Founder, echoecho Jules Cohen, Director of Online Privacy, Microsoft Nicole Ozer, Technology and Civil Liberties Policy Director, ACLU of Northern California Paul Schwartz, Faculty Director, Berkeley Center for Law & Technology, UC Berkeley Moderator: Jules Polonetsky, Co-chair and Director, Future of Privacy Forum There is a growing tension between economic opportunities to mine the ever-increasing amounts of data available online vs. consumer and regulator desire for strong privacy protections. This distinguished roundtable will explore the ins and outs of this complex topic, including: - how people are shaping not only their own online personas, but also the personas of friends, relatives and even total strangers - sophisticated technologies that companies and governments are using to get to know people online - options for individuals who want to control what is collected about them and how it is used - the potential for industry to leverage the growing wealth of available data, while striking the right balance between innovation and regulation A wide range of perspectives will be represented on the panel, with senior thought leaders from ACLU of Northern California, Echoecho Media, Future of Privacy Forum, Microsoft, UC Berkeley. This program is presented in observation of Data Privacy Day, which was created to build awareness about privacy issues and help people navigate them.
Views: 1296 ChurchillClub
TGEs (7/18): Data protection and blockchain technology
 
03:04
Meet-up held in Zug / Switzerland on June 19, 2017, on US and Swiss perspectives on Token Generating Events (TGE); hosted by Crypto Valley Association, MME Legal | Tax | Compliance, Debevoise & Plimpton and Blockhaus; moderated by Andreas Glarner (MME). In Part 7, Martin Eckert (MME) explains data protection regulations.
Views: 789 MME Switzerland
Helen Nissenbaum – Respect for Context as a Privacy Benchmark: What it is, and isn’t
 
01:15:34
In February 2012, the Obama White House unveiled its Consumer Privacy Bill of Rights, comprising seven principles. The third, “Respect for Contexts,” requires companies that “collect, use, and disclose personal data,” to do so, “in ways that are consistent with the context in which consumers provide the data.” I argue that certain interpretations, favored by influential parties in the privacy debate, offer little hope for progress beyond the status quo, and suggest, instead, an interpretation derived from the theory of contextual integrity. Given the recurring presence of “context” in the February 2015 Administration Discussion Draft, this issue will be decisive for robust privacy policy in the near future.
Views: 502 CITP Princeton
California Passes "Strongest" Data-Privacy Bill Yet, Could Become "Law Of The Land"
 
02:35
PLEASE SUBSCRIBE! Comcast customers across the United States experienced a massive internet, cable TV, and telephone outage on Friday... Read more: https://www.zerohedge.com/news/2018-06-29/new-california-data-privacy-law-nations-strongest-set-become-law-land Artificial Intelligence, Weird Weather, Spiritual Warfare, Politics, Gun Control, and More! MUST READ New Fiction Book - 'LIGHT: A Wayfarers Story' Kindle and paperback: https://www.amazon.com/LIGHT-Wayfarers-Story-Book-ebook/dp/B07CGXNFJ9 Free Read of 'Sleepless Possum'- Chapter 1 LIGHT: A Wayfarers Story http://walkthetowpath.com/sleepless-possum-chapter-1-of-light-the-wayfarers-story/ A sampling of my music: https://soundcloud.com/jim_yackel Blog Site and Emergency Video Backup: http://walkthetowpath.com Buy Me a Cup of Coffee: https://paypal.me/coffee4jim
Views: 41 Jim Yackel
What is DATA AGGREGATION? What does DATA AGGREGATION mean? DATA AGGREGATION meaning & explanation
 
06:23
What is DATA AGGREGATION? What does DATA AGGREGATION mean? DATA AGGREGATION meaning - DATA AGGREGATION definition - DATA AGGREGATION explanation. Source: Wikipedia.org article, adapted under https://creativecommons.org/licenses/by-sa/3.0/ license. Data aggregation is the compiling of information from databases with intent to prepare combined datasets for data processing. The source information for data aggregation may originate from public records and criminal databases. The information is packaged into aggregate reports and then sold to businesses, as well as to local, state, and government agencies. This information can also be useful for marketing purposes. In the United States, many data brokers' activities fall under the Fair Credit Reporting Act (FCRA) which regulates consumer reporting agencies. The agencies then gather and package personal information into consumer reports that are sold to creditors, employers, insurers, and other businesses. Various reports of information are provided by database aggregators. Individuals may request their own consumer reports which contain basic biographical information such as name, date of birth, current address, and phone number. Employee background check reports, which contain highly detailed information such as past addresses and length of residence, professional licenses, and criminal history, may be requested by eligible and qualified third parties. Not only can this data be used in employee background checks, but it may also be used to make decisions about insurance coverage, pricing, and law enforcement. Privacy activists argue that database aggregators can provide erroneous information. The potential of the Internet to consolidate and manipulate information has a new application in data aggregation, also known as screen scraping. The Internet gives users the opportunity to consolidate their usernames and passwords, or PINs. Such consolidation enables consumers to access a wide variety of PIN-protected websites containing personal information by using one master PIN on a single website. Online account providers include financial institutions, stockbrokers, airline and frequent flyer and other reward programs, and e-mail accounts. Data aggregators can gather account or other information from designated websites by using account holders' PINs, and then making the users' account information available to them at a single website operated by the aggregator at an account holder's request. Aggregation services may be offered on a standalone basis or in conjunction with other financial services, such as portfolio tracking and bill payment provided by a specialized website, or as an additional service to augment the online presence of an enterprise established beyond the virtual world. Many established companies with an Internet presence appear to recognize the value of offering an aggregation service to enhance other web-based services and attract visitors. Offering a data aggregation service to a website may be attractive because of the potential that it will frequently draw users of the service to the hosting website. When it comes to compiling location information on local businesses, there are several major data aggregators that collect information such as the business name, address, phone number, website, description and hours of operation. They then validate this information using various validation methods. Once the business information has been verified to be accurate, the data aggregators make it available to publishers like Google and Yelp. When Yelp, for example, goes to update their Yelp listings, they will pull data from these local data aggregators. Publishers take local business data from different sources and compare it to what they currently have in their database. They then update their database it with what information they deem accurate. Financial institutions are concerned about the possibility of liability arising from data aggregation activities, potential security problems, infringement on intellectual property rights and the possibility of diminishing traffic to the institution's website. The aggregator and financial institution may agree on a data feed arrangement activated on the customer's request, using an Open Financial Exchange (OFX) standard to request and deliver information to the site selected by the customer as the place from which they will view their account data. Agreements provide an opportunity for institutions to negotiate to protect their customers' interests and offer aggregators the opportunity to provide a robust service.
Views: 2945 The Audiopedia
How Pharmacies Use Your Prescription Info
 
05:23
Joint Committee on Health Care Financing held a hearing on several bills related to data mining (S. 17, S. 19, H. 109, and H. 110). These bills prevent pharmaceutical companies from buying doctors prescribing records from pharmacies and using that information to target their marketing to physicians. Jasmin Weaver spoke about the need to protect patient privacy and gave the example of CVS/Caremark marketing on behalf of Merck to their pharmacy patients. When asked by Senator Candaras, Representative Grant and Representative DAmico, why this practice was not a violation of HIPAA, Weaver and Wilkinson replied that this practice is a loophole under HIPAA and is actually allowed. This law will close that loophole for Massachusetts.
Views: 1047 HCFAMA
Consumer Access to Data (2013 Consumer Health IT Summit)
 
44:06
The 2013 Consumer Health IT Summit brought together federal, private and non-profit leaders to discuss the present and future state of patient engagement using Health IT and Blue Button. A panel discusses consumer access to data. Learn more at http://www.healthit.gov. -- U.S. Department of Health and Human Services (HHS) http://www.hhs.gov We accept comments in the spirit of our comment policy: http://www.hhs.gov/web/socialmedia/policies/comment-policy.html HHS Privacy Policy http://www.hhs.gov/Privacy.html
SOCIAL MEDIA: A Loss of Privacy?
 
03:01
See more in our series on social media Digital U: http://bit.ly/tvodigitalu The internet has closed the geographical gap and put information right at our fingertips but its also important for all users to remember that anything they put on the web, can be difficult to remove, and accessible by almost anyone. Any profile or account you create online can be searched by employers, potential spouses, friends, family and strangers which not only puts your reputation at risk, but also your safety. Sites like Facebook and Lava Life have varying degrees of privacy settings and its extremely important to be conscious of how much of your personal information is open to the public. As a user you need to be aware and beware of the digital crumbs you can leave behind.
Views: 15134 tvochannel
Safe and Surveilled
 
02:17:30
On March 26, 2014, the National Security Law Journal hosted "Safe and Surveilled," a symposium featuring former U.S. Attorney General Michael Mukasey, who spoke on the NSA, wiretapping, and the data mining program known as PRISM. A spirited debate between Professor Robert Turner of the University of Virginia School of Law and Professor Stephen Vladeck of American University's Washington College of Law followed Judge Mukasey's keynote address. The event was held at George Mason University School of Law in Arlington, Virginia.
Reality Mining, the Citizen, and the State. Ben Wizner, Thomas Hegghammer, Hugh Eakin
 
01:30:36
On 20–21 October 2016 The New York Review of Books Foundation and Fritt Ord hosted the conference ‘Technology and the Human Future.’ Full programme and list of panelists here: http://www.frittord.no/arrangementer/technology-and-the-human-future/ Panel 5 Reality Mining, the Citizen, and the State Chair: Jon Wessel-Aas, Attorney at the Norwegian Supreme Court Hugh Eakin, Senior Editor, The New York Review of Books, Editor of The New York Review Daily Thomas Hegghammer, Senior Research Fellow at the Norwegian Defence Research Establishment Ben Wizner, Director of the Speech, Privacy, and Technology Project, American Civil Liberties Union, and the principal legal advisor to Edward Snowden HUGH EAKIN is a Senior Editor at The New York Review of Books, Editor of the New York Review Daily, and Adjunct Professor at the Columbia University School of Journalism, New York. He has reported extensively for The Review from Scandinavia and the Middle East. THOMAS HEGGHAMMER is Senior Research Fellow at the Norwegian Defence Research Establishment. He is the author of Saudi Arabia in Transition (2014) and Jihad Culture: The Art and Social Practices of Militant Islamists (forthcoming). JON WESSEL-AAS is an attorney at the Norwegian Supreme Court and a partner of the law firm Bing Hodneland. He specializes in freedom of expression, privacy, media and civil rights law. He chairs the board of the International Commission of Jurists, Norwegian section. BEN WIZNER is Director of the American Civil Liberties Union’s (ACLU) Speech, Privacy and Technology Department. He is an Adjunct Professor at New York University School of Law and is principal legal adviser to the US National Security Agency whistleblower Edward Snowden. About the Conference: With the coming of what we’re calling ‘pervasive internet access’ is there evidence that the quality of our life experiences are becoming attenuated and fragmented, undergoing mutations which point to changes in what it means to be human? Does the capture, classification and use by businesses of Big Data yielded by our Internet lives have a legitimate role in adding to consumer convenience and choice; and at what point does this ‘reality mining’ bring unacceptable violations of privacy? Does the combined use of these technologies in the workplace risk overwhelming employees with panoptic regimes of surveillance which may not only be an affront to their human dignity, but also obstacles to human creativity and so, ironically, enemies of the very employee productivity which between them the systems are meant to enhance?
Views: 262 Fritt Ord
Web Sites Accused of Privacy Violations
 
03:49
Lawmakers and regulators are trying to do more to address consumer concerns about the difficulty of removing personal data permanently from websites that collect it, Julia Angwin reports on digits. Don’t miss a WSJ video, subscribe here: http://bit.ly/14Q81Xy More from the Wall Street Journal: Visit WSJ.com: http://www.wsj.com Visit the WSJ Video Center: https://wsj.com/video On Facebook: https://www.facebook.com/pg/wsj/videos/ On Twitter: https://twitter.com/WSJ On Snapchat: https://on.wsj.com/2ratjSM
Views: 334 Wall Street Journal
Big Data Privacy and Security at Mondato Summit by Ladislav Urban, CEO of Syoncloud
 
19:08
Security and Privacy Challenges of Big Data www.syoncloud.com 1. Introduction 2. Protection of Sensitive Data via De-Identification and Data Masking 3. Big Data Analytics for Security 4. Example of Big Data Analytics Workflow 5. Big Data Analytics Setup for SAP 6. Current Security Features in Hadoop Environment 7. Future of Hadoop Environment Security 8. Privacy and Security from Consumer's Point of View 9. Question and Answers 1. Introduction My name is Ladislav Urban and I am an CEO of Syoncloud. Our company provides consulting and implementation services for Big Data projects for banks, telcos and energy companies. During our work we have experienced some security challenges. I would like share my experience with you.
Views: 57 syoncloud
The impact of new privacy legislation on e-commerce and online payments
 
04:50
http://www.privacylaws.com Speaker: Micah Thorner, General Counsel of Ingenico e-Payments, Global Collect Services, the Netherlands Recorded at the Privacy Laws & Business 28th Annual International Conference Privacy in a Connected World 6 - 8 July 2015, Cambridge, UK http://www.privacylaws.com From metadata to storage requirements, from Canada to Singapore, several recent developments in the area of data protection and privacy law are expected to change the way that companies do business online. Which recent developments are expected to have the most significant impact on global e-commerce activities and how should businesses modify existing practices? This presentation will cover recent regulatory and legislative changes in privacy and data protection law and the likely impact on e-commerce for both merchants and service providers, including financial services entities who process customer data, with a focus on the following: • The legal framework that governs cross-border e-commerce and the role of data protection and privacy laws o Jurisdiction and extra-territorial application of data protection laws • Developments that have worried businesses the most in 2014: o New laws in Australia, South Korea, Turkey, Singapore and Russia o New ECJ decisions: right to be forgotten and Google Spain (mention of Google v. Vidal Hall in UK) o Regional evolutions to monitor:  • Data protection law in Africa (Ghana)  • Contractual consent in Latin America • Practical considerations for business: what are the biggest concerns for online businesses and financial services? • Solutions to minimize risk and maximize compliance in 2015
7/9/13 Financial Services Committee Hearing on CFPB Consumer Data Collection
 
01:38
"Examining How the Consumer Financial Protection Bureau Collects and Uses Consumer Data" Thank you Madam Chair. Today's hearing, I think, is very timely. Events in the news have focused the American people's attention on the very important subject of privacy and government surveillance. Data collection and research is not a bad thing; in fact it's the sort of diligence we should expect of a regulator. However just because a government agency has good intentions, or a benevolent sounding name, doesn't mean Congress should just look the other way while tens of millions of Americans are having their financial history gathered up and stored. Just as the Dodd Frank Act gave the CFPB the authority that it is now exercising to collect this data, the law also put some very specific constraints on this activity. Recent stories involving the NSA have demonstrated that the American people and members of congress have every reason to be suspicious of so-called "meta data" gathering and analysis. We don't just need assurances that there is nothing potentially harmful or invasive going on, we need maximum transparency to ensure it beyond any doubt. The CFPB must do more in this regard. The right to privacy is not an inconvenient matter that can just be swept aside when it hinders government investigations. It is a constitutional right that deserves the highest levels of protection. Privacy and freedom from unwarranted surveillance are fundamental to individual liberty and we cannot allow any trespasses on these hard-fought principles. I appreciate the Chairwoman's work on this matter. I look forward to the testimony and I yield back.
Views: 113 RepFitzpatrickPA8
Federal Initiatives to Liberate Health Data - 2012 Consumer Health IT Summit
 
16:26
Todd Park, U.S. Chief Technology Officer, moderates a panel on federal initiatives to open health data. Learn more at http://www.healthit.gov/patients-families/. Sign up to receive email updates from HHS.gov: https://public.govdelivery.com/accounts/USHHS/subscriber/new -- U.S. Department of Health and Human Services (HHS) http://www.hhs.gov We accept comments in the spirit of our comment policy: http://www.hhs.gov/web/socialmedia/policies/comment-policy.html HHS Privacy Policy http://www.hhs.gov/Privacy.html

Singulair 5 mg mastigavel
Naproxene eg 500 mg
Socialism countries 2011 gmc
Zoloft 100 mg ingredients in aleve
Zocor 10 mg pill